Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - Viewpoint: V for Vendetta and the rise of Anonymous (bbc.co.uk)

tmcb writes: On Saturday protests are planned across the world against Acta — the Anti-Counterfeiting Trade Agreement. The treaty has become the focus of activists associated with the Anonymous hacking network because of concerns that it could undermine internet privacy and aid censorship. First published in 1982, the comic series V for Vendetta charted a masked vigilante's attempt to bring down a fascist British government and its complicit media. Many of the demonstrators are expected to wear masks based on the book's central character. Ahead of the protests, the BBC asked V for Vendetta's writer, Alan Moore, for his thoughts on how his creation had become an inspiration and identity to Anonymous.
Mozilla

Submission + - Sandboxed Flash Player Coming to Firefox (threatpost.com)

Trailrunner7 writes: Adobe, which has spent the last few years trying to dig out of a deep hole of vulnerabilities and buggy code, is making a major change to Flash, adding a sandbox to the version of the player that runs in Firefox. The sandbox is designed to prevent many common exploit techniques against Flash.

The move by Adobe comes roughly a year after the company added a sandbox to Flash for Google Chrome. Flash, which is perhaps the most widely deployed piece of software on the Internet, has been a common attack vector for several years now, and the attacks in some cases have been used to get around exploit mitigations added by the browser vendors. The sandbox is designed to prevent many of these attacks by not allowing exploits against Flash to break out into the browser itself.

Businesses

Submission + - Mark Zuckerberg Orders Banks to Shut Up (ibtimes.com)

redletterdave writes: "In the weeks leading up to Facebook's massive $100 billion initial public offering, Mark Zuckerberg reportedly told JPMorgan Chase, Morgan Stanley, Goldman Sachs and the other banks involved in the IPO to stop leaking information to the media. Zuckerberg was reportedly unhappy that the banks leaked details about his company's Wall Street debut, including the Feb. 1 date it chose to file its S-1 paperwork with the SEC. Facebook execs are also miffed about the subtle rivalry between Morgan Stanley and Goldman Sachs, which were jockeying to become the lead underwriter for the IPO, the largest since Google's $1.7 billion offering in 2004. The banks are heeding Zuckerberg's warning, urging their employees to keep quiet about Facebook's filing, because disobeying Zuckerberg's wishes could mean getting dropped from one of the most lucrative IPOs in recent memory. The banks stand to make $40 million from their deals with Facebook."
Google

Submission + - Google's Eric Schmidt: In God We Trust - All Others Bring Data (singularityhub.com)

kkleiner writes: "Recently at the MIT Sloan School of Management, Google's Eric Schmidt presented his thoughts on how the focus on hardware and software will fade in importance to harnessing the globally generated network of knowledge and data. In his talk titled "The Future of the Global Mind", Schmidt declares the global network of knowledge to be “as important, if not more important, as the development of electricity.” He also gives the audience a new motto: “in God we trust, but all others bring data”."
Education

Submission + - Best Guides for a basic understanding of Practical Electricity? (youtube.com) 2

(arg!)Styopa writes: Watching the interesting video (at http://www.youtube.com/watch?v=z2oSFpKh_Uw&feature=player_embedded#!) about using old ATX powersupplies for a lab-bench powersupply, I realized that for years I've had an interest in DIY electrical experiments, but never tried them mainly out of sheer ignorance of all things electrical. Sure, I know what amps and volts, but what's the difference between +5V and -5V? 2-phase vs 3? What's a resistor, and how does it put a 'load' on a current? Why is this important?
With all the DIY tinkerers on /., can anyone suggest good books or sites for a good "grounding" (sorry) in the sorts of electrical basics that might help prevent me getting killed experimenting?

Microsoft

Submission + - Bill Gates Wants to Give It All Away (internetevolution.com)

hapworth writes: Bill Gates, whose net worth is estimated at $61 billion, stated that he wants to give all of his money away before he dies. Journalist Ron Miller today contrasts this with Apple "and its $100 billion (and growing quickly) stash" and lack of a charitable foundation. Is this where Apple can take a cue from Microsoft? This author thinks so, writing, "It's a worthy goal to want to leave the world a better place. Too bad every tech billionaire and the companies they founded haven’t tried the same."

Submission + - Anonymous reveals Haditha massacre emails (rt.com)

An anonymous reader writes: Anonymous have unveiled their second major release for this week’s installment of FuckFBIFriday. Their target this time around is Frank Wuterich, the US Marine that admitted to killing Iraqi civilians — and received no jail time for his crime.

Early Friday afternoon, members of the loose-knit online collective Anonymous began circulating news that the website for Puckett and Faraj, the high-profile attorneys that represented Sgt. Frank Wuterich in his recent trial, had been hacked. Wuterich admitted to leading Marines into two civilian homes in Waditha, Iraq in 2005, massacring 24 civilians including women, children and an elderly man confined to a wheelchair.

In response, hacktivists with Anonymous have uncovered gigabytes worth of correspondence from Sgt. Wuterich’s attorneys and affiliated parties.

Games

Submission + - Dead Gamer goes Unnoticed for Nine Hours (itproportal.com)

hypnosec writes: A gamer has been found dead in a Taipei internet cafe, though not very quickly — it took over nine hours for anyone to notice. The unfortunate gamer was 23 year old Chen Rong-yu who entered an internet cafe in New Taipei one evening to play League of Legends. Around 24 hours later it was discovered by a waitress that he was in-fact dead. It turns out he'd been that way for nine hours and nobody had noticed. Mammoth gaming sessions with heavy concentration are pretty common in Chinese internet cafes where people who can't play their favorite games at home can do so in a public setting. Still though, you'd think every 40 minutes when you're back at the character select, you might have a little look around and notice the guy next to you hasn't clicked the mouse for a few hours.
Android

Submission + - HP: WebOS better than 'fragmented' Android, 'closed' iOS (bgr.com)

zacharye writes: Though Hewlett-Packard was unable to produce webOS devices that consumers were interested in buying — at a positive margin, at least — CEO Meg Whitman still thinks the beleaguered platform has legs. After unsuccessfully trying to sell or license webOS, HP decided late last year to donate its $1.2 billion platform to the open source community. The firm still plans to launch new webOS devices in the future, however, and Meg Whitman explained HP’s position...
Canada

Submission + - Canada's Internet among best, report says (financialpost.com)

silentbrad writes: Canadians enjoy among the fastest, most widely available and least expensive broadband Internet in the developed world, says a report released Thursday. The report, based on the results of 52 million speed tests of broadband users across the G7 countries and Organization for Economic Co-operation and Development (OECD) membership, was produced by Montreal-based consulting firm Lemay Yates Associates Inc. on behalf of Rogers Communications Inc., the country's largest broadband service provider. It disputes the OECD's own report, published in July, that ranked Canada's high-speed Internet offerings significantly below those of other countries ... The report comes days after the Canadian Radio-television and Telecommunications Commission (CRTC) revealed a sharp jump in the number of complaints it has received regarding Internet traffic-management practices or "throttling" in recent months.
Privacy

Submission + - Password Storage and Privacy Policies

OldSoldier writes: Privacy policies talk about what companies will do with your personal data. Some policies you may like some you may not like, but disclosure of the policies is the key thing. My problem is these policies neglect to mention the single most important data item sites collect about you, your password. It seems most companies do one of three things with your password. a) store it in the clear, b) store it encrypted or c) store it encrypted but you need to share it with an operator to use it. Examples of this last variation include any pin-like code you need to verbally share with a phone operator to (say) adjust your billing record.

The thing is I care deeply which policy is in place at whatever company wants me to give a password. I will give different passwords depending on the type of system they use. Yet trying to determine which system they use is very difficult.

Government requires privacy policies yet appear to be mute on this very important issue. What can we as slashdot readers do (or should we do) to fix this situation?
The Military

Submission + - Robotics Could Return to Consumer Market (theepochtimes.com)

jjp9999 writes: Right when home robotics were about to take off, the market was destroyed by the global financial crisis. Some companies saved themselves by cashing in on military programs, others waited it out with less expensive home robots, yet cuts to military spending, coupled with the ends of operations in Iraq and Afghanistan, could shift the market back to the consumer side. ‘These companies are going to need something to sell,’ said AI programmer Robert Oschler. ‘What are they going to do with the R&D departments, what are they going to design and sell now that the markets are drying up? They’re going to turn to the consumer marketplace.’
Programming

Submission + - 5 Hot Specialties For Software Developers (infoworld.com)

snydeq writes: "Fatal Exception's Neil McAllister reports on five lucrative niches for ambitious developers looking to escape the outsourcing axe. 'There's no denying that software development is still a very lucrative profession. But rote coding and code maintenance are increasingly considered low-value functions — and ones that are easily outsourced. Developers who want to maintain an advantage in today's job market need to specialize. Fortunately, IT moves so quickly that there is never a shortage of unique niches for shrewd engineers to occupy. Here are just five examples of specialized skill areas that are sure to experience rapid growth in the coming years.'"
EU

Submission + - EU Privacy Rules Enforce Net Neutrality (itworld.com)

jfruh writes: "In a scene familiar to those following the net neutrality debate in the US, a representative of the broadband industry — Cisco, in this case — declared that government intervention in favor of net neutrality removes incentives to invest in high-speed networks. The twist, though, is that the Cisco exec was talking about EU privacy rules. These rules don't explicitly enforce net neutrality, but make it illegal to do the sort of packet inspection that "traffic shaping" requires."
Programming

Submission + - Transitioning from "hacker"(positive sense) to "en

antifoidulus writes: So I'm about to get my masters in CS and start out (again) in the "real world", I already have a job lined up, but there is one thing that is really nagging me. Since my academic work has focused almost solely on computer science and not software engineering per se, I'm really still a "hacker", meaning I take a problem, sketch together a rough solution using the appropriate Computer Science algorithms, and then code something up(using a lot of prints to debug), do some basic testing and go with it.... Obviously something that works quite well in the academic environment but not in the "real world" obviously. Even at my previous job, which was sort of a jack-of-all-trades(sysadmin, security, support, and programming) the testing procedures were not particularly rigorous and as a result I don't think I'm really mature as an "engineer"

So my question to the community is how do you make the transition from hacker(in the positive sense) to a real engineer. Obviously the "Mythical Man Month" on the reading list, but anything else? How do you get out of the "hacker" mindset?

Slashdot Top Deals

Any given program will expand to fill available memory.

Working...